Active Directory FundamentalsRecent Posts

Hyper-V Virtualization: An explanation

What you will learn from this article: There are many scenarios where something would need to be tested on a server or a computer machine. In such scenarios, instead of using a physical test machine, it would be better to use a virtual representation of a target machine, so that should anything go wrong, this ‘virtual machine’ can be shut down without affecting the real machine.
Read more
Active Directory FundamentalsRecent Posts

Active Directory Users and Computers (ADUC) – Part II

In part Iof Active Directory Users and Computers, we introduced the Active Directory Users and Computers (ADUC) snap-in. We also saw a list of tasks an administrator can perform from the ADUC console and described how to perform a few basic tasks. In this part, we will look at some Active Directory advanced features that will come in handy for an administrator managing users…
Read more
Active Directory FundamentalsRecent PostsTop Read Articles

Active Directory Users and Computers (ADUC) - An introduction and installation guide

Active Directory Users and Computers (ADUC) is a common tool used by administrators to carry out daily tasks and much more in Active Directory AD. Some of the tasks an administrator can perform with the help of this MMC snap-in are as follows: Create and manage AD objects, such as users, computers, groups, and contacts, along with their attributes. Create Organizational Units (OU), move…
Read more
Active Directory FundamentalsTop Read Articles

Group Policy Backup

What you will learn: Group policies are critical pieces of instructions in an Active Directory environment used to configure a variety of advanced settings that can be applied to objects in the network. A set of Group Policy configurations are bundled as Group Policy Objects (GPO) which can then be applied to objects. IT administrators take weeks and months to create GPOs that are customized to…
Read more
Active Directory FundamentalsTop Read Articles

Active Directory Maintenance Checklist

What you will learn from this article: There are so many moving parts related to Active Directory (AD). So, it is important to know how to monitor, report, fix and diagnose issues related to the different supporting technologies. Identifying bottlenecks and resolving them before they cause much harm improves productivity, ensures efficient usage of resources, maintains consistency in data and…
Read more
Active Directory Fundamentals

NTLM authentication and Kerberos Authentication Protocols Explained

What you will learn: A network needs to have security processes put in place to avoid the misuse of its resources. An authentication process goes a big way in identifying whether a person is who they say they are, or a fraud. Active Directory employed the NTLM authentication protocol to securely authenticate its users, which was then succeeded by the Kerberos authentication protocol. In this…
Read more